Cyber Job Description
Cyber Duties & Responsibilities
To write an effective cyber job description, begin by listing detailed duties, responsibilities and expectations. We have included cyber job description templates that you can modify and use.
Sample responsibilities for this position include:
Cyber Qualifications
Qualifications for a job description may include education, certification, and experience.
Licensing or Certifications for Cyber
List any licenses or certifications required by the position: IAT, II, CISSP, CEH, RMF, ITIL, DIACAP, III, CASP, CCNA
Education for Cyber
Typically a job would require a certain level of education.
Employers hiring for the cyber job most commonly would prefer for their future employee to have a relevant degree such as Bachelor's and Master's Degree in Computer Science, Engineering, Education, Technical, Computer Engineering, Cyber Security, Information Systems, Science, Electrical Engineering, Mathematics
Skills for Cyber
Desired skills for cyber include:
Desired experience for cyber includes:
Cyber Examples
Cyber Job Description
- Assess student knowledge, skills, and abilities to gauge student proficiency in topic area
- Apply industry best practices in adult learning principles and theories
- Review and analyze training materials and recommend changes
- Conduct courses relevant to the assigned topic area
- Provide technical area expertise to advise on the development of training material to meet the Windows Operating Systems topic area objectives
- Ensure Windows topic area training material Is integrated and supports related topic area training materials
- Perform task and skill analysis of training requirements to develop learning objectives within training materials
- Interact with training developers, curriculum managers and mission customers to assist with design and implementation of a total training package
- Coordinate with ADET to incorporate training into the NCS curriculum as required
- Strong team player and communicator who is able to lead, motivate, and participate in a team oriented, fast-paced environment
- Must be able to maintain level of clearance required for this position
- Working knowledge of DCID 6/3
- Currently hold at least one (1) industry-standard information security management certification from a vendor or product neutral certification entity
- Ability to identify C2, dropper files, registry key modifications, DLL injection, based on malware analysis
- Pursing a Bachelor or Master of Science degree in Electrical or Computer Engineering, Computer Science, Physics, or a similar field, with a focus Cyber Security
- Process analysis/engineering
Cyber Job Description
- Problem definition, data exploration, data acquisition and visualization, evaluating and comparing metrics, deploying various models and iteratively improving solutions
- Develop continuous improvements with Fusion Center teams to push the organization towards new and improved ways to use data to improve our protective posture
- Engage with stakeholders to identify data efficiency requirements
- Will be responsible for instruction of Cyber and security related training
- Serves as a Cyberspace Operations Training Developer/Instructor to identify, develop, tailor, deploy, and provide Cyber and/or security related training and will plan, develop, and assist in the implementation of Cyber and/or security training programs for the client, including Train-The-Trainer (TTT) items
- Prepare lesson plans and training materials, design product demonstrations, develop course content, and conduct training
- Performing tasks associatedwith the production cycle, including researching, tasking, analysis, reporting,assessing, and interacting with customers
- Contributing to knowledge management byentering sources and analytic findings into appropriate databases and otherrepositories on a timely basis
- Meeting customers' delivery deadlines andsatisfying customer expectations for accuracy and completenes
- Documenting reports and customer feedback inlocal Request for Information (RFI) tracking databases and other recordingsystems
- Bachelor’s degree students must earn a minimum GPA of 3.0 on a 4.0-point scale
- Must be able to work full time during summer months
- BA or BS degree in Cyber, Law Enforcement, or an Intelligence
- Have a minimum of seven (7) years of experience, with at least four (4) of those involving CND and Incident Response
- Possess security certifications (CISSP, Security+, IAT certificatoin)
- Five or more years of related experience in Advanced Cyber Analytics
Cyber Job Description
- Participate in training and helping our organization to keep up to date with market standards within the IT, ICS and security area
- Provides in-depth research, analysis, and support to Observer Trainers (OTs) across all functional areas within the Deployable Training Division (DTD), including preparation for academics, exercises, and staff assist visits, analytic support during academics, exercises, and staff assist visits (SAVs), and preparing the functional after-action review, Commander’s Facilitated After-action Review (FAAR), and Commander’s Summary Report (CSR)
- Maintains and reviews historical data and produces functional area overviews and trend analysis reports
- Assists in development and updating functional area focus papers and input to Joint Doctrine
- Provides functional area experience, continuity, and expertise in training and developing functional area OTs
- Serves as military trainer in the functional area as a member of the DTD Deployable Training Team (DTT), providing facilitated academic seminars, collecting observations and best practices, and providing advice and assistance to training audiences during exercises and SAVs
- Conducts in-depth research and analysis in preparation for exercises, provides functional after-action reviews, and provides support to the DTT Team Chief in preparing the FAAR and CSR
- Provides facilitated seminars on joint operations for the KEYSTONE, CAPSTONE, and PINNACLE programs as part of the Senior Leader Education Program for the National Defense University
- Provide computer security incident response including monitoring, detection, investigation, and lessons learned
- Research and analyze security threat intelligence from a variety of sources
- Experience working with version control systems (SVN, GIT, ) as part of a structured development environment
- Data/statistical analysis
- Full-time students enrolled in a four-year college or university working toward a BS in a related field
- Vigilantly protect User data, ensuring proper handling and protection electronically
- Experience with remote desktop technologies, VNC, RDP
- 5+ years of experience with developing and revising DoD Joint planning doctrines and processes
Cyber Job Description
- Conduct analyses of breaches, attacks and insider threats on customers’ cloud assets
- Investigate cloud cyber incidents and work with customers towards their resolution
- Apply data research tools, threat intelligence and external feeds to research cloud cyber security events
- Analyze data and alerts to establish ongoing risk and threat metrics and threat indicators
- Author advisories, incident reports, research papers and blog posts
- Oversee the deployment of products by vendors
- Carryout ISO27001 IT Audits on various projects
- Implement ISO27001 directives
- Perform vulnerability assessments on IT infrastructure and provide fixes
- Orchestrate automatic deployment of end-point solutions from vendors like Symantec / Mac Afee / Trend Micro and Kaspersky
- Working knowledge of full packet capture PCAP analysis and accompanying tools (Wireshark, netcat, hping)
- 3+ years of recent operational security experience (SOC, Incident Response, Forensics, Malware Analysis, IDS/IPS Analysis)
- Ability to demonstrate proficiency in the Farsi language with at least a 2/2 on the DLPT
- IAT Level III certification (CASP, CISA, CISSP, GCIH (or Associate), GCED)
- Penetration testing, Pen testing, pen tester, penetration tester
- Malware analysis, IDAPro
Cyber Job Description
- Act as on the spot problem solver in a ‘get the job done’ spirit
- Ensure verification and documentation while the job is being performed
- Gather and compile evidence documentation
- Perform random test to verify job execution
- Report on both progress by email
- Report on other issues detected/suspected that could justify some extra work
- Manage MS Exchange and Active directory
- Manage CISCO appliances
- Selects, underwrites, and prices commercial lines cyber risks accounts with some level of of complexity and within delegated underwriting authority
- Maintains a highly technical expertise in cyber risk commercial lines underwriting
- SANS Training (e.g., Forensics series 408, 508
- Encase training & cert
- Programming C++, C, Java, other languages and platforms
- Bachelor's degree in Computer Science or a related field with 5 years of experience OR Masters degree and 3years of experience
- Education in Computer Science, Mathematics, Data Mining, Analytics, Data Science or other quantitative disciplines
- Knowledge of a range of computer security issues, with depth in at least one or two functional areas